I need few reputed journals having very less review processing time in field of Networks & security.
1. Computer Communications: The International Journal for the Computer and Telecommunications Industry by Elsevier.
2. ACM Computing Surveys
3. IEEE Microwave and Wireless Components Letters
4. International Journal of Communication Networks and Information Security (IJCNIS)
5. Journal of Network and Systems Management
In past, I have worked on HTTP based Low-rate and Slow-rate HTTP DoS attacks. In continuation to that, I want to know about few other similar DoS attacks on layer-7.
06 July 2016 7,110 4 View
I am searching for such network attacks which are quite new and current research is going on to propose mitigation techniques for that attack.
10 November 2015 6,956 16 View
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point. Can it be done in case of WPA2 encrypted networks too, i mean the complete four way...
03 April 2015 7,204 3 View
I want to know, on an average, how many wireless clients can be associated to a wireless access point at a time?
03 April 2015 8,935 8 View
Please provide me some links or documents for the same.
03 April 2015 6,218 0 View
I wanted to know when DHCP Server frees an offered (but not allotted) IP address and return it back to the address pool. Is there a time limit? This happens when server doesn't receive the...
02 March 2015 3,288 3 View
According to cisco enterprise mobility, the clients are associated to Access Points using MAC address. So, can an attacker send various DHCPDISCOVER messages using spoofed random source MAC...
02 March 2015 392 7 View
According to cisco enterprise mobility, it is stated that "Even if port security is not an option to stop MAC flooding in wireless networks, the MAC flooding attack is unsuccessful when launched...
02 March 2015 2,801 7 View
While capturing DHCPDISCOVER messages, I found out that some of them are sending these using an IP address. The snapshot for the same is attached:
31 December 2014 5,644 8 View
Suppose our TCP SYN packet goes directly to the attacker. Can he generate fake response (TCP SYN-ACK) packet and send it back to us?
31 December 2014 8,453 2 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
Question to you and THEM, the New Journal, "Integrative Psychological and Behavioral Science" -- do you not know, and have you not seen, this done before? There appears to be a core problem for...
02 March 2021 3,024 2 View
I would like to know how to register the journal Flora Montiberica (ISSN 1138-5952 - eISSN 1988-799X) in Research Gate.
02 March 2021 8,156 2 View
As we know many journals are posting preprints (DOI) in advance before the peer-review process. However, there is no guarantee that the preprints get published. The journal's reviewers undergo the...
01 March 2021 5,778 2 View
Hi Community, I'm facing the issue of integration/compiling a new routing protocol in a WSN simulator. The final goal is to successfully add, configure this routing protocol in hardware devices...
01 March 2021 9,332 6 View
Dear Researchers I am trying to perform a PIL simulation using STM32F4 Discovery board and comunication serial USB TO TTL. During simulation I receive the following timeout error: An error...
01 March 2021 2,327 1 View
Hi, I have several doubts about one paper (Systematic Literature Review) that was rejected. The main topic is Single-Board Computers in engineering education during the period 2010-2020. The...
01 March 2021 9,015 3 View
According to my experience most of the selected journals during paper submission are based on journal text matching suggested results from Springer, Elsevier,,,Etc. then the manuscript happened to...
01 March 2021 1,786 3 View
It should be standard journal (Indexed)
01 March 2021 8,379 1 View
Source to get Impact factor of journals
01 March 2021 6,654 2 View